Apply the various concepts you have learned throughout this course to the design of the single most secure network possible, capable of supporting three IT services: e-mail, file transfer (centralized), and VPN.
After you have fully designed your network, you will need to provide three data flow diagrams explaining how your designed network handles three different transactions:
Sample Solution